Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
Screen_Recording_20240802_210028.mp4
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Screen_Recording_20240802_210028.mp4
Resource
win10v2004-20240802-en
General
-
Target
Screen_Recording_20240802_210028.mp4
-
Size
7.6MB
-
MD5
e06ffcaf40b56c6a6f23529c69194f49
-
SHA1
c33b56c2ebafcc9db29dfdc18b79f264d12beb36
-
SHA256
20fcdd16f39016ad9b0fb620d78781f33d810b8cd12afab033dff7af8c05f9fc
-
SHA512
df1a766e312f7c87e5d28a1b3af7a8a8613dc2dc735b04a7f3e6a23f829156552680c7e934097cbdcd0103263a8fda932d62b48d81064d8b46abb226716b36a6
-
SSDEEP
196608:UkYKWJcUZIcupMdWIUZP7D0RgQoHPlkRNXlkM5M:/jWJccINK4Q8kRhlkuM
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-786284298-625481688-3210388970-1000\{87D4314D-3FDE-42F1-A175-E564D6DE840A} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4504 wmplayer.exe Token: SeCreatePagefilePrivilege 4504 wmplayer.exe Token: SeShutdownPrivilege 3224 unregmp2.exe Token: SeCreatePagefilePrivilege 3224 unregmp2.exe Token: 33 1116 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1116 AUDIODG.EXE Token: SeShutdownPrivilege 4504 wmplayer.exe Token: SeCreatePagefilePrivilege 4504 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4504 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4052 4504 wmplayer.exe 83 PID 4504 wrote to memory of 4052 4504 wmplayer.exe 83 PID 4504 wrote to memory of 4052 4504 wmplayer.exe 83 PID 4052 wrote to memory of 3224 4052 unregmp2.exe 84 PID 4052 wrote to memory of 3224 4052 unregmp2.exe 84
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Screen_Recording_20240802_210028.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4008
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b0 0x4f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5ac3ee86217156be8e5269ec5e3e8c6d9
SHA179a95126e8c98ea46e602a72a56bd64b6859d2db
SHA256cc4fce97c0c1ef96395d20f96add156b547ef9a03967373e41fd627d8047dd6e
SHA51268142b57a3a5332a5cf97e5b7d954a803b1fe8d02670cc614b57b1e7daded2ad2358de240f7defd436256e702b008ba74078744c14b7261d19b936c1b709574e
-
Filesize
1024KB
MD551eb1fc437074b4708e00046489e52bd
SHA16f6ea9b47704008711348422d397cd7724625f40
SHA2562ab8478c8d6a46a613df7de2583c2fd7777345045a1c18d52244ed302b955df4
SHA512ae830b06d19f1cf2c7d6972c5a1905750b123b3e561be208a6e13a43f1ed136e7e9611fc6ac9d94be8705f01c85aee2c6db9d15e95e5fbe5bad4448515b16988
-
Filesize
68KB
MD59f16e181f16e7c4a0fd416848b287146
SHA1769e9721fd562dcf8c327ec9eac29dcd9a6d54a3
SHA256e195a89b80c5956ed9c356c51cc62c43ea7cd8033d0c5bcb04667c680d7d581b
SHA512df443eea47e8af08c72e5cba377662020d14746d90217cad0d421b175f2f849e9d84bcc23352074cc92d081e3c6b1d208df9ac45ac2fe7851a2f412d452d470f
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD563d352a6d63f7be9881d24c2c629e034
SHA1c7e24a61650fec90a580c2ed90409b0eb6363fd1
SHA25682e8d5105eb9aa356d6dffe5109fc05e56db89fd7fbf5e0f9082f6afc5d71c93
SHA5128f883ed77dd879521099f96fe23142703cd362f1176c07eef7146abd4bc99efcc94630e2983b988a500345665899a8cf485d8601d5f21289a442110e327e8b4f